Cybersecurity Fundamentals Chapter 4

123456789101112
Across
  1. 1. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  2. 4. use one key to encrypt data and a different key to decrypt data.
  3. 8. to encrypt and decrypt messages.
  4. 10. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
  5. 11. science of making and breaking secret codes.
  6. 12. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
  1. 2. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  2. 3. has a fixed block size of 128, 192 or 256 bits.
  3. 5. implementing cryptography into a web browser.
  4. 6. a protocol that provides a secure remote access connection to network devices.
  5. 7. way to store and transmit data so only the intended recipient can read or process it.
  6. 9. fundamental component of ipsec virtual private networks (vpn).